Answering Top-k Queries over Outsourced Sensitive Data in the Cloud

被引:0
|
作者
Mahboubi, Sakina [1 ]
Akbarinia, Reza
Valduriez, Patrick
机构
[1] Univ Montpellier, INRIA, Montpellier, France
关键词
Cloud; Sensitive data; Top-k query; PRIVACY; SEARCHES;
D O I
10.1007/978-3-319-98809-2_14
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The cloud provides users and companies with powerful capabilities to store and process their data in third-party data centers. However, the privacy of the outsourced data is not guaranteed by the cloud providers. One solution for protecting the user data is to encrypt it before sending to the cloud. Then, the main problem is to evaluate user queries over the encrypted data. In this paper, we consider the problem of answering top-k queries over encrypted data. We propose a novel system, called BuckTop, designed to encrypt and outsource the user sensitive data to the cloud. BuckTop comes with a top-k query processing algorithm that is able to process efficiently top-k queries over the encrypted data, without decrypting the data in the cloud data centers. We implemented BuckTop and compared its performance for processing top-k queries over encrypted data with that of the popular threshold algorithm (TA) over original (plaintext) data. The results show the effectiveness of BuckTop for outsourcing sensitive data in the cloud and answering top-k queries.
引用
收藏
页码:218 / 231
页数:14
相关论文
共 50 条
  • [1] Diversified Top-k Answering of Cypher Queries over Large Data Graphs
    Mahfoud, Houari
    [J]. 2023 20TH ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, AICCSA, 2023,
  • [2] On Top-k Queries over Evidential Data
    Bousnina, Fatma Ezzahra
    Chebbah, Mouna
    Tobji, Mohamed Anis Bach
    Hadjali, Allel
    Ben Yaghlane, Boutheina
    [J]. ICEIS: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 1, 2017, : 106 - 113
  • [3] CrowdK: Answering top-k queries with crowdsourcing
    Lee, Jongwuk
    Lee, Dongwon
    Hwang, Seung-won
    [J]. INFORMATION SCIENCES, 2017, 399 : 98 - 120
  • [4] Answering Top-k Exemplar Trajectory Queries
    Wang, Sheng
    Bao, Zhifeng
    Culpepper, J. Shane
    Sellis, Timos
    Sanderson, Mark
    Qin, Xiaolin
    [J]. 2017 IEEE 33RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2017), 2017, : 597 - 608
  • [5] Answering Top-k Similar Region Queries
    Sheng, Chang
    Zheng, Yu
    Hsu, Wynne
    Lee, Mong Li
    Xie, Xing
    [J]. DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, PT I, PROCEEDINGS, 2010, 5981 : 186 - +
  • [6] Answering Top-k Queries Over a Mixture of Attractive and Repulsive Dimensions
    Ranu, Sayan
    Singh, Ambuj K.
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2011, 5 (03): : 169 - 180
  • [7] Secure Outsourced Top-k Selection Queries against Untrusted Cloud Service Providers
    Yu, Xixun
    Hu, Yidan
    Zhang, Rui
    Yan, Zheng
    Zhang, Yanchao
    [J]. 2021 IEEE/ACM 29TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2021,
  • [8] Efficiently answering probabilistic threshold top-k queries on uncertain data
    Hua, Ming
    Pei, Jian
    Zhang, Wenjie
    Lin, Xuemin
    [J]. 2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, : 1403 - +
  • [9] Privacy-Preserving Top-k Keyword Similarity Search over Outsourced Cloud Data
    Teng Yiping
    Cheng Xiang
    Su Sen
    Wang Yulong
    Shuang Kai
    [J]. CHINA COMMUNICATIONS, 2015, 12 (12) : 109 - 121
  • [10] Privacy-Preserving Top-k Keyword Similarity Search over Outsourced Cloud Data
    TENG Yiping
    CHENG Xiang
    SU Sen
    WANG Yulong
    SHUANG Kai
    [J]. China Communications, 2015, 12 (12) : 109 - 121